Lesson 4 (Security basics & TLS) Flashcards

1
Q

What does TLS stand for?

A

Transport Layer Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Where is the TLS encryption used for?

A

Authorisation, Authentication, Confidentiality (information only for intented users), Integrety (information not changed)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

At what layer position is TLS between: Application layer, TCP layer and IP layer?

A

Between Application and TCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the new name for SSL?

A

TLS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is HTTPS?

A

HTTPS is HTTP-within-SSL/TLS. SSL (TLS) establishes a secured, bidirectional tunnel for arbitrary binary data between two hosts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How does HTTP run over HTTPS?

A

HTTPS is a tunnel/connection, which is encrypted. The HTTP traffic runs over this collection. Its also referred as SSL/TLS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

At what layer position is TLS in network apps? Between Application, http and tcp

A

Between Application and HTTP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Name 4 of commonly used programs which usually make use of a TLS connection/encryption

A

HTTPS (websites), VOIP, VPN and Email

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the latest stable released version of TLS and in what year?

A

TLS 1.2, in 2008.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the new upcoming version of TLS?

A

1.3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a cipher suite?

A

Is a named combination os authentication, encryption, message authentication code (MAC) and key exchange algorithms used to negotiate the security settings for a SSL/TLS connection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Name some examples of Authentication encryption algorithms

A

RSA, DSA, ECDSA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Name some examples of key exchange algorithms

A

RSA, Diffie-Hellman, ECDH, SRP, PSK

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Name some examples of bulk encryption algorithms

A

RC4, Triple DES, AES, IDEA, DES, or Camellia. In older versions of SSL, RC2 was also used.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Name some examples of message authentication code algorithms

A

for TLS, a Hash-based Message Authentication Code using MD5 or one of the SHA hash functions is used. For SSL, SHA, MD5, MD4, and MD2 are used.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

In which type of encryption algorithms is the encryption key the same as the decryption key?

A

In Symmetric key cyptography like AES. Its a key used to encrypt AND decrypt data, with this specific key.

17
Q

What is the most common used algorithm for public and private key pairs?

A

RSA. Named after researchers: Rivest, Shamir and Adleman

18
Q

Hows does RSA work with public-private key encryption?

A

Data gets encrypted with the public key. The encrypted data can only be decrypted by using the private key AND the public key.

19
Q

What standard certificates are used for TLS?

A

X509 certificates

20
Q

How are certificates checked?

A

They can be checked on domain and organization level. The company that provides the certificate and the browsers have a database of trusted sites.

21
Q

What three levels of CA trustchains are there (above an implemented certificate on a website)

A

First the ROOT CA of the origanization. Then the Intermediate CA and finally the Leaf CA. Then comes the real end certificates for domains.

22
Q

What types of Hash methods are there?

A

SHA1 to SHA3 and MD5.

23
Q

Wat are vonurabilities of hash functions?

A

You can predict the outcome, because the hash value can be the same. Which could also result in a collision.

24
Q

What is a man in the middle (attack) ?

A

They can manipulate encrypted data by replacing hash functions/value or certificate verifiying

25
Q

Where can hash functions be used for?

A

For encrypting passwords (one way), checking unique files or to generate random data.

26
Q

What is the difference between HASH and MAC?

A

Hashes are used to garantuee the integrity of data. MAC garuantees the integrety and authetication as well, because MAC is generated using a KEY (apart from the value)

27
Q

How is it possible to verify a certificate?

A

By decrypting the certs signature with the public key of the issuer. Then generate the MD5 hash of the certificate and check the outcome of both.

28
Q

Where is the record protocol used for?

A

Encryption and data integrity. As a part of the TLS/SSL connection.

29
Q

How can you harden your Glassfish server with safety stuff?

A

realms, groups and roles for proper rights. Or by adding security constraints/allowance annotation tag in the code.
JaxRS: Jersery oauth libs, role annotation and security context interface.

30
Q

Where are the symmetric keys generated that are used to encrypt/decrypt data over TLS/SSL?

A

In the handshake protocol before this.

31
Q

What is the diff between Authentication and Authoriation?

A

Authentication is to verify the user. Authorization is tocheck if the user has the proper rights to do something.

32
Q

What is message integrity?

A

Reliable data, which is not just randomly encrypted, but by a key which only a original user could have for example.

33
Q

Which key is included in a digital certificate?

A

public key

34
Q

Private and public key are not asymmetric because?

A

They are not the same, you need them both separately to decrypt the data.

35
Q

What are the 3 most common errors made when it comes to checking certificates in mobile apps?

A

Dont verify host names. Ignore ssl errors and dont check the server certificates.

36
Q

How does a CA (Certificate Authority) certificate work with verifying your cert?

A

The whole thing is signed by a trusted authority. The trusted authority, aka certificate authority (CA) also has a private/public key pair. You give them your certificate, they verify that the information in the container are correct and sign it by their private key, only they have access to.

The public key of the CA is installed on the user system by default, most well known CAs are included already in the default installation of your favorite OS or browser.

When now a user connects to your server, your server uses the private key to sign some data, packs that signed data together with its public key and sends everything to the client.